Filter your results
- 5
- 5
- 5
- 4
- 1
- 2
- 1
- 1
- 5
- 2
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.554-563, ⟨10.1007/978-3-642-55032-4_57⟩
Conference papers
hal-01397269v1
|
||
|
CAPTCHA Suitable for Smartphones1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.131-140, ⟨10.1007/978-3-642-36818-9_14⟩
Conference papers
hal-01480158v1
|
||
|
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.129-138, ⟨10.1007/978-3-319-24315-3_13⟩
Conference papers
hal-01466212v1
|
||
|
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.139-148, ⟨10.1007/978-3-319-24315-3_14⟩
Conference papers
hal-01466213v1
|
||
|
Enhancement of Automata with Jumping Modes25th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2019, Guadalajara, Mexico. pp.62-76, ⟨10.1007/978-3-030-20981-0_5⟩
Conference papers
hal-02312614v1
|